Why ATMs and points of sale need protection and what we have done to provide it
ATMs and point-of-service systems are extremely vulnerable to malware — and software vendors are no longer patching them. Here’s how to make them safer.
1055 articles
ATMs and point-of-service systems are extremely vulnerable to malware — and software vendors are no longer patching them. Here’s how to make them safer.
A vulnerability affecting all versions of Windows since Windows 2000 through Windows 10 might have been discovered. It’s still uncertain, however.
Although the history of Microsoft Windows XP seemed to end in April 2014, the operating system was not completely gone; many embedded devices still ran Windows XP Embedded Service Pack 3, and as such they were dependent on its security updates.
One of the most popular techniques used to penetrate corporate defenses is the use of vulnerabilities found in working software, which, in fact, do not need to be brand-new 0-days.
In a highly surprising move, the notorious Teslacrypt authors have wrapped up their operation and released the ransomware’s master key.
The late April was especially “rich” with news related to bugs, attacks and Android-targeting malware.
An update to RannohDecryptor now allows to beat a newer version of CryptXXX too.
Gartner’s Magic Quadrant is a tool that helps to choose which vendor fits organizations best for a particular business purpose. It is designed for CIO’s, decision makers, and IT-security specialists of the businesses.
A new APT group is seen to have been exploiting hotpatching, a now-deprecated feature in Windows operating systems, to carry out their attacks.
Locky and Petya ransomware strains took the world by storm when they shouldn’t be successful at all.
Securelist has released a new report on DDoS attacks in the first quarter of 2016.
Instead of writing their own malicious tools, criminals are increasingly using the off-the-shelf malware, and more and more often – totally legitimate software.
Remember the beginning of Terminator 2: The Judgement Day where John Connor is shown hacking an ATM with an Atari Portfolio?
Ransomware is mostly the end-user problem. However, businesses get hit too, and hit hard, especially the smaller ones.
A new strain of ransomware targets servers which is, mildly put, a troubling development.
Yet another ZeuS variant is threatening businesses.
It’s not common that the ransomware criminals can be outsmarted. But sometimes they can be.
Users also want and expect access to data 24/7, with no barriers or lag times.
Kaspersky Lab has developed a new solution to provide industrial cybersecurity – Kaspersky Industrial CyberSecurity.
Cryptomalware can infiltrate and encrypt an entire network – including its backups – within minutes.
Kaspersky Lab strives for efficient protection and to regularly improve our technology. One of the recent changes affected Kaspersky Security for Virtualization | Light Agent, our security solution for virtual environments. Now it supports one more virtualization platform – Kernel-based Virtual Machine (KVM).